Are You The Keymaster? Best Practices in Encryption Key Management